Chrooted functionality?

I have successfully upgraded to version 2.2.5 and just tested the chroot function. I logged in using a non-admin user and was able to access higher levels above the user's jailed directory. I could get all the way up to root. Is this not a security issue? What do I need to do?

No sir, I did not change anything manually. But I am wondering if this has anything to do with running your chrooted how-to in the past and if the updated ISPConfig chroot function is conflicting with it. Here are the contents:

When I try using PuTTy, I login and is simply closes the interface without error. This usually happens when I do not specify the BASH shell in the /etc/passwd file, but this is not the case. Each user has BASH specified.

I noticed that only a couple web users are in the replicated webx/etc/passwd file. Wouldn't this be a problem? I created a new user and looked to see if they were copied to the webx/etc/passwd file and they were not.

It seems the /root/ispconfig/scripts/shell/create_chroot_env.sh is not good enough for FC/CentOS. It doens't copy all the needed files to run /bin/bash Just add the last 5 lines to your create_chroot_env.sh

It should work. But I was unable to test it, because I get segmentation faults now.